The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited.

Slides:



Advertisements
Similar presentations
1 of 21 Information Strategy Developing an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy Developing.
Advertisements

Systems Security Engineering An Updated Paradigm INCOSE Enchantment Chapter November 8, 2006 John W. Wirsbinski.
1 Introduction to Safety Management April Objective The objective of this presentation is to highlight some of the basic elements of Safety Management.
Efficient Secure Aggregation in VANETs Maxim Raya, Adel Aziz, and Jean-Pierre Hubaux Laboratory for computer Communications and Applications (LCA) EPFL.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
Pete Thomas Professor in Road and Vehicle Safety Vehicle Safety Research Centre Loughborough University, UK A review of ITS and their safety.
GREEN PAPER "TOWARDS A NEW CULTURE FOR URBAN MOBILITY" EUROPEAN COMMISSION.
the European Union policy
The Fully Networked Car Geneva, 3-4 March DEVELOPMENT OF OPEN-CORE FLEXRAY CONTROLLER FOR OEM ULTRA LOW COST AUTOMOTIVE APPLICATIONS PRAMOD.VSUBRAT.
Colombo, Sri Lanka, 7-10 April 2009 Preferential Telecommunications Service Access Networks Lakshmi Raman, Senior Staff Engineer Intellectual Ventures.
Evolution of Automotive In-Vehicle Networking
The Fully Networked Car Geneva, 4-5 March T. Russell Shields Chair, Ygomi LLC Vehicle Communications to Help the Environment.
Module N° 7 – Introduction to SMS
The EMERALD RTD Plan and the ASAS Validation Framework R P (Bill) Booth 10 October 2002.
1 Ben Pierce, Battelle March 2, 2010 US DOT IntelliDrive SM Program.
0 - 0.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
Addition Facts
1 9 Moving to Design Lecture Analysis Objectives to Design Objectives Figure 9-2.
Dependability analysis and evolutionary design optimisation with HiP-HOPS Dr Yiannis Papadopoulos Department of Computer Science University of Hull, U.K.
Copyright The Info-Tech Research Group Inc. All Rights Reserved. D1-1 by James M. Dutcher Strategic IT Planning & Governance Creation H I G H.
EMS Checklist (ISO model)
Risk Ranking : An Example Process and Method SI-POWER Nuclear Cable Workshop August 6-7, 2012 Richmond, VA Shane A. McManus Senior.
Integrated Approach to Area Master Planning in Jubail Industrial City
IntelliDrive Safety Workshop July 20, 2010 Ray Resendes US Department of Transportation National Highway Traffic Safety Administration IntelliDrive Vehicle-toVehicle.
Active Safety Functions Relations with Connected Car Bernard NICLOT Technical Director of the FIA March 2014 Connected Car - Safety.
© S Haughton more than 3?
Determining the Significant Aspects
What Is The User Interface Design Lecture # 2 Gabriel Spitz 1.
United Nations Economic Commission for Europe Transport Division United Nations Economic Commission for Europe Transport Division ITU - Inland Transport.
Field Operational Tests in 7FP Fabrizio Minarini Head of Sector DG INFSO - ICT for transport.
2 3 There are two basic areas where there is a need to have resources available. Internal:  Financial  Personnel  Assets  Time External  Consultants.
HIGH COUNCIL FOR ECONOMY, INDUSTRY, ENERGY AND TECHNOLOGIES 1 Metrology policies to foster the competitiveness of industry J.F. Magaña.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialBCMSN BCMSN Module 1 Lesson 1 Network Requirements.
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Addition 1’s to 20.
Week 1.
Module 12 WSP quality assurance tool 1. Module 12 WSP quality assurance tool Session structure Introduction About the tool Using the tool Supporting materials.
Modular Urban Transport Safety and Security Analysis 1 SiT - Safety in Transportation 2012.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
LAPD TELEMATICS PRESENTATION. Why Consider Telematics? 1. Advanced Vehicle Technology 2. Advanced Wireless Communications 3. New Generation of Police.
overview Motivation Ongoing research on VANETs Introduction Objectives Applications Possible attacks Conclusion.
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
27/08/2015 Intelligent Transport Services ETSI activities 1GSC-9, Seoul SOURCE:ETSI (ERM TG#37) TITLE:Intelligent Transport Services – ETSI activities.
Architecting secure software systems
IntelliDrive Policy and Institutional Issues Research Valerie Briggs Team Lead, Knowledge Transfer and Policy, ITS Joint Program Office, RITA May 4, 2010.
Safety All The Time Oyuki Ogawa Executive Vice President DENSO CORPORATION.
Gzim Ocakoglu European Commission, DG MOVE World Bank Transport Knowledge and Learning Program on Intelligent Transportation Systems (ITS), 24/06/2010.
Mike Schagrin US Department of Transportation ITS Joint Program Office IntelliDrive Safety Program Overview.
The Fully Networked Car Geneva, 4-5 March Ubiquitous connectivity to improve urban mobility Hermann Meyer ERTICO.
 CS 5380 Software Engineering Chapter 11 Dependability and Security.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
September 25, 2013 Greg Davis FHWA Office of Safety Research, Development and Test Overview of V2I Safety Applications.
Risk Assessment Richard Newman. Six Phases of Security Process 1. Identify assets 2. Analyze risk of attack 3. Establish security policy 4. Implement.
ITU-T Workshop “ICTs: Building the green city of the future” - EXPO-2010, 14 May 2010, Shanghai, China Committed to Connecting the World ITU-T Workshop.
International Telecommunication Union The Fully Networked Car Geneva, 3-4 March 2010 Technical session 5: Electric vehicles and Climate Change Enabling.
1 National Highway Traffic Safety Administration An Overview of NHTSAs Vehicle Safety Research Priorities Nathaniel Beuse Associate Administrator, Vehicle.
Swedish Risk Management System Internal management and control Aiming to Transport Administration with reasonable certainty to.
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
Eyal Hamo Berry Shnaider בס " ד 1.
SAE Cybersecurity Standards Activity
Suggestion for Summarizing Process of the Principles
Information & Safety Systems
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
ASSET - Automotive Software cyber SEcuriTy
Smart Car through IoT 라이 아샤리 리날디
Risk Assessment Richard Newman
Network and security practices in automotive systems
Network and security trends in connected cars
Presentation transcript:

The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited

The Fully Networked Car Geneva, 3-4 March Motivation o Future vehicles will become mobile nodes in a dynamic transport network vehicle systems will be under threat from malicious individuals and groups seeking to gain personal or organizational advantage ensuring security will be critical for the successful deployment of V2X technology o EU project EVITA aims to prototype a toolkit of techniques and components to ensure the security of in-vehicle systems hardware, software, analysis methods

The Fully Networked Car Geneva, 3-4 March 2010 EVITA scope and assets 3 EVITA only aims to investigate network security solutions at vehicle level Different levels of security protection are envisaged, depending on need Some assets may not require security measures (low risk) Risk analysis aims to prioritize security requirements

The Fully Networked Car Geneva, 3-4 March 2010 EVITA project security risk analysis rationale o Too costly to protect against every threat, so need to rank risks in order to prioritize countermeasures o Risk associated with a security attack depends on: severity of impact (ie. harm to stakeholders) drivers, other road users, civil authorities, ITS operators, vehicle manufacturers and system suppliers probability of successful attack depends on attacker resources, nature of attack o Physical safety is a key aspect of security physical harm may be an objective of an attack harm may also be an unintended consequence 4

The Fully Networked Car Geneva, 3-4 March 2010 Starting point – EVITA Use Cases 5 Powertrain PTC Body Electronic BEM Diagnosis Interface Hybrid Drive Engine Control Bluetooth USB Communication Unit CU Transmission Chassis & Safety CSC Chassis / Steering Brake Control Environmental Sensors Passive Safety Airbag Door Modules Instrument Light Control Display / Video Audio Navigation Head Unit HU Mobile Device In-vehicle network structure PT Sensors Chassis Sensors e.g. Steer Angle GPS/Galileo UMTS DSRC Telephone Climate Seat ECU A suite of 18 potential use cases was defined, based on EASIS project network architecture Scenario classes: car-car car-infrastructure mobile devices aftermarket maintenance Assumed reference architecture

The Fully Networked Car Geneva, 3-4 March 2010 Security threat agents and their motivations o Dishonest drivers avoid financial obligations, gain traffic advantages; o Hackers gain/enhance reputation as a hacker; o Criminals and terrorists financial gain, harm or injury to individuals or groups; o Dishonest organisations driver profiling, industrial espionage, sabotage of competitor products; o Rogue states achieve economic harm to other societies 6

The Fully Networked Car Geneva, 3-4 March Threat analysis – Attack Trees Common model to map attack trees to risk analysis

The Fully Networked Car Geneva, 3-4 March 2010 Severity classification in vehicle safety engineering 8

The Fully Networked Car Geneva, 3-4 March 2010 Extending from safety to security 9

The Fully Networked Car Geneva, 3-4 March 2010 Severity classification of privacy infringements 10

The Fully Networked Car Geneva, 3-4 March 2010 Financial severity classification 11

The Fully Networked Car Geneva, 3-4 March 2010 Security severity classification – a 4-component vector 12

The Fully Networked Car Geneva, 3-4 March 2010 Attack potential and probability o Attack potential evaluation using established, structured approach from Common Criteria applied in EVITA at asset attack level of attack trees o Indicative of attack probability (inverse relationship) numerical scale used to represent relative ranking of attack probability 13

The Fully Networked Car Geneva, 3-4 March 2010 Possibility for the driver (and/or other traffic participants) to mitigate possible safety hazards Controllability – safety hazards 14

The Fully Networked Car Geneva, 3-4 March 2010 Risk graph (fragment only) 15 Non-safety aspects addressed with table for controllability C=1 (C>1 only for safety issues)

The Fully Networked Car Geneva, 3-4 March 2010 A compressed tabular attack tree representation provides a convenient framework for documenting the risk analysis Attack Objective Severity (S) Attack Method Risk level (R) Combined attack method probability (A) Asset (attack) Attack Probability (P) B SBSB B1 R B1 (S B, A B1 )A B1 =min{Pa,Pb} a & b Pa Pb B2 R B2 (S B, A B2 )A B2 =max{Pd,Pe,Pf} d Pd e Pe f Pf Attack tree tables for risk analysis 16 OR: as easy as the easiest option AND: as hard as the hardest component

The Fully Networked Car Geneva, 3-4 March 2010 Overview of EVITA attack trees o The 18 EVITA use cases suggested 10 attack trees: attack E-call, attack E-toll tamper with warnings, attack active break manipulate speed limits, force green light manipulate traffic flow, simulate traffic jam unauthorized braking, engine denial-of-service o These are representative, but not exhaustive o Rationalization of the attack trees revealed: 44 different asset attacks, involving 16 different assets o Risk analysis provides the means to assess the relative importance of protecting these assets 17

The Fully Networked Car Geneva, 3-4 March 2010 Risk-based prioritisation of counter-measures 18

The Fully Networked Car Geneva, 3-4 March Conclusions o A security risk analysis approach has been developed from automotive safety and IT security practices attack trees to identify asset attacks from use cases, attacker type and motivations 4-component security risk vector, potentially including security-related safety issues attack potential and controllability to assess probability of successful attack o Level and frequency of risks associated with asset attacks identified in attack trees indicate priorities for counter-measures

The Fully Networked Car Geneva, 3-4 March 2010 Acknowledgements 20 For further information see: